Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    03/10/2024, 00:20

General

  • Target

    System.exe

  • Size

    139.6MB

  • MD5

    a1bd7f9fcdb0b75d30fa9f0caac5d2a7

  • SHA1

    5602eb1782cb0de1aba91d3c06589be195c5dee8

  • SHA256

    7c878c82ccd577f3dad67fb1fe5e0b681f27ba9a741c79bfd9bbfa032dccde65

  • SHA512

    1befc5c99e4832dd5d53759c4ff6e24d9a6059e494573f84d3395c1473690d29ec1534f9fcce20ab54f811a69d4c443f862dc7ddb908c99037637105b58bf85e

  • SSDEEP

    786432:d14w5ThzHwQBgmoLWv+K18nCzKdo5DTdvfMQr6SSmPuvh8tSIW68:d14kpHwQjCWv+K18CedmVvEQEpcJW

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Collects information from the system 1 TTPs 1 IoCs

    Uses WMIC.exe to find detailed system information.

  • Detects videocard installed 1 TTPs 1 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\System.exe
    "C:\Users\Admin\AppData\Local\Temp\System.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2092
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "tasklist"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2052
      • C:\Windows\system32\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • Suspicious use of AdjustPrivilegeToken
        PID:2752
    • C:\Users\Admin\AppData\Local\Temp\System.exe
      "C:\Users\Admin\AppData\Local\Temp\System.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\script" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=972 --field-trial-handle=1144,11865548391691777407,9080176110640869300,131072 --disable-features=PlzServiceWorker,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
      2⤵
        PID:2760
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /d /s /c "wmic process where processid=NaN get ExecutablePath"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1312
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic process where processid=NaN get ExecutablePath
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2484
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /d /s /c "tasklist"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1420
        • C:\Windows\system32\tasklist.exe
          tasklist
          3⤵
          • Enumerates processes with tasklist
          • Suspicious use of AdjustPrivilegeToken
          PID:2876
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /d /s /c "net session"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:876
        • C:\Windows\system32\net.exe
          net session
          3⤵
            PID:2892
            • C:\Windows\system32\net1.exe
              C:\Windows\system32\net1 session
              4⤵
                PID:2372
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /d /s /c "wmic logicaldisk get size"
            2⤵
              PID:1208
              • C:\Windows\System32\Wbem\WMIC.exe
                wmic logicaldisk get size
                3⤵
                • Collects information from the system
                PID:1744
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /d /s /c "wmic computersystem get totalphysicalmemory | more +1"
              2⤵
                PID:2672
                • C:\Windows\System32\Wbem\WMIC.exe
                  wmic computersystem get totalphysicalmemory
                  3⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2800
                • C:\Windows\system32\more.com
                  more +1
                  3⤵
                    PID:1232
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /d /s /c "wmic csproduct get uuid"
                  2⤵
                    PID:2856
                    • C:\Windows\System32\Wbem\WMIC.exe
                      wmic csproduct get uuid
                      3⤵
                        PID:1812
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /d /s /c "echo %NUMBER_OF_PROCESSORS%"
                      2⤵
                        PID:1452
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /d /s /c "wmic OS get caption, osarchitecture | more +1"
                        2⤵
                          PID:2168
                          • C:\Windows\System32\Wbem\WMIC.exe
                            wmic OS get caption, osarchitecture
                            3⤵
                              PID:1288
                            • C:\Windows\system32\more.com
                              more +1
                              3⤵
                                PID:1044
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /d /s /c "wmic cpu get name | more +1"
                              2⤵
                                PID:1804
                                • C:\Windows\System32\Wbem\WMIC.exe
                                  wmic cpu get name
                                  3⤵
                                    PID:3012
                                  • C:\Windows\system32\more.com
                                    more +1
                                    3⤵
                                      PID:1716
                                  • C:\Users\Admin\AppData\Local\Temp\System.exe
                                    "C:\Users\Admin\AppData\Local\Temp\System.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\script" --mojo-platform-channel-handle=1588 --field-trial-handle=1144,11865548391691777407,9080176110640869300,131072 --disable-features=PlzServiceWorker,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8
                                    2⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:3016
                                  • C:\Users\Admin\AppData\Local\Temp\System.exe
                                    "C:\Users\Admin\AppData\Local\Temp\System.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\script" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1624 --field-trial-handle=1144,11865548391691777407,9080176110640869300,131072 --disable-features=PlzServiceWorker,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
                                    2⤵
                                      PID:2016
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /d /s /c "wmic PATH Win32_VideoController get name | more +1"
                                      2⤵
                                        PID:3048
                                        • C:\Windows\System32\Wbem\WMIC.exe
                                          wmic PATH Win32_VideoController get name
                                          3⤵
                                          • Detects videocard installed
                                          PID:1636
                                        • C:\Windows\system32\more.com
                                          more +1
                                          3⤵
                                            PID:1004
                                        • C:\Windows\system32\cmd.exe
                                          C:\Windows\system32\cmd.exe /d /s /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault"
                                          2⤵
                                            PID:1712
                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                              powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault
                                              3⤵
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:2280

                                        Network

                                        MITRE ATT&CK Enterprise v15

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • \Users\Admin\AppData\Local\Temp\4c879ee7-cf3d-4887-9454-b9d852018d5e.tmp.node

                                          Filesize

                                          1.8MB

                                          MD5

                                          3072b68e3c226aff39e6782d025f25a8

                                          SHA1

                                          cf559196d74fa490ac8ce192db222c9f5c5a006a

                                          SHA256

                                          7fb52b781709b065c240b6b81394be6e72e53fe11d7c8e0f7b49dd417eb78a01

                                          SHA512

                                          61ebc72c20195e99244d95af1ab44fa06201a1aee2b5da04490fdc4312e8324a40b0e15a7b42fab5179753d767c1d08ae1a7a56ac71a6e100e63f83db849ee61

                                        • \Users\Admin\AppData\Local\Temp\c6110f2f-2558-480a-91f4-68a9a4bc7545.tmp.node

                                          Filesize

                                          643KB

                                          MD5

                                          d549d81caf247e8779887b59b5605d67

                                          SHA1

                                          a6b04e526da738b6501a6b570cef2146ea516ae6

                                          SHA256

                                          67e5b369c0dcafe09077eabc98662d37218b1b081373a6b18ab980b8e3c84bef

                                          SHA512

                                          eb3f831a594b9290075be6b5b338a4b13c596c174b8c97b466d3b1eff00386ffdee9e0598a4fa45c3a3de6028bfafa462e8b87e458f79b67646d3f02705438a6

                                        • memory/2280-120-0x000000001B6C0000-0x000000001B9A2000-memory.dmp

                                          Filesize

                                          2.9MB

                                        • memory/2280-121-0x0000000001FF0000-0x0000000001FF8000-memory.dmp

                                          Filesize

                                          32KB

                                        • memory/2760-41-0x0000000076C80000-0x0000000076C81000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2760-9-0x0000000000060000-0x0000000000061000-memory.dmp

                                          Filesize

                                          4KB